-
1
-
-
0037209773
-
On the symbolic reduction of processes with cryptographic functions
-
R. Amadio, D. Lugiez, and V. Vanackère. On the symbolic reduction of processes with cryptographic functions. Theor. Comput. Sci., 290(1):695-740, 2003.
-
(2003)
Theor. Comput. Sci.
, vol.290
, Issue.1
, pp. 695-740
-
-
Amadio, R.1
Lugiez, D.2
Vanackère, V.3
-
2
-
-
0030078047
-
Unification in the union of disjoint equational theories, combining decision procedures
-
F. Baader and K. U. Schulz. Unification in the union of disjoint equational theories, combining decision procedures. J. Symb. Comput., 21(2):211-243, 1996.
-
(1996)
J. Symb. Comput.
, vol.21
, Issue.2
, pp. 211-243
-
-
Baader, F.1
Schulz, K.U.2
-
3
-
-
0142188052
-
An on-the-fly model-checker for security protocol analysis
-
Einar Snekkenes and Dieter Gollmann, editors LNCS 2808, Springer-Verlag
-
D. Basin, S. Mödersheim, and L. Viganò. An On-The-Fly Model-Checker for Security Protocol Analysis. In Einar Snekkenes and Dieter Gollmann, editors, Proceedings of ESORICS'03, LNCS 2808, pages 253-270. Springer-Verlag, 2003.
-
(2003)
Proceedings of ESORICS'03
, pp. 253-270
-
-
Basin, D.1
Mödersheim, S.2
Viganò, L.3
-
4
-
-
84879529172
-
Symbolic trace analysis of cryptographic protocols
-
LNCS 2076, Springer-Verlag, Berlin
-
M. Boreale. Symbolic trace analysis of cryptographic protocols. In Proceedings of the 28th ICALP'01, LNCS 2076, pages 667-681. Springer-Verlag, Berlin, 2001.
-
(2001)
Proceedings of the 28th ICALP'01
, pp. 667-681
-
-
Boreale, M.1
-
6
-
-
0041967380
-
An NP decision procedure for protocol insecurity with XOR
-
June
-
Y. Chevalier, R. Kuesters, M. Rusinowitch, and M. Turuani. An NP Decision Procedure for Protocol Insecurity with XOR. In Proceedings of the Logic In Computer Science Conference, LICS'03, June 2003.
-
(2003)
Proceedings of the Logic in Computer Science Conference, LICS'03
-
-
Chevalier, Y.1
Kuesters, R.2
Rusinowitch, M.3
Turuani, M.4
-
7
-
-
35248865266
-
Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents
-
Lecture Notes in Computer Science. Springer, December
-
Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani. Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents. In Proceedings of the Foundations of Software Technology and Theoretical Computer Science, FSTTCS'03, Lecture Notes in Computer Science. Springer, December 2003.
-
(2003)
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, FSTTCS'03
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
8
-
-
26444458330
-
Combining intruder theories
-
Luís Caires, Giuseppe F. Italiano, Luís Monteiro, Catuscia Palamidessi, and Moti Yung, editors, ICALP, Springer
-
Y. Chevalier and M. Rusinowitch. Combining intruder theories. In Luís Caires, Giuseppe F. Italiano, Luís Monteiro, Catuscia Palamidessi, and Moti Yung, editors, ICALP, volume 3580 of Lecture Notes in Computer Science, pages 639-651. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3580
, pp. 639-651
-
-
Chevalier, Y.1
Rusinowitch, M.2
-
10
-
-
35048861399
-
Intruder theories (ongoing work)
-
Igor Walukiewicz, editor, 7th International Conference, FOSSACS 2004, Barcelona, Spain, March. Springer Verlag
-
H. Comon-Lundh. Intruder theories (ongoing work). In Igor Walukiewicz, editor, 7th International Conference, FOSSACS 2004, volume 2987 of Lecture Notes on Computer Science, pages 1-4, Barcelona, Spain, March 2004. Springer Verlag.
-
(2004)
Lecture Notes on Computer Science
, vol.2987
, pp. 1-4
-
-
Comon-Lundh, H.1
-
12
-
-
35248836596
-
Easy intruder deductions
-
Verification: Theory and Practice
-
H. Comon-Lundh and R. Treinen. Easy intruder deductions. In Verification: Theory and Practice, volume 2772 of Lecture Notes in Computer Science, pages 225-242, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2772
, pp. 225-242
-
-
Comon-Lundh, H.1
Treinen, R.2
-
13
-
-
14844335720
-
A decision procedure for the verification of security protocols with explicit destructors
-
Washington, D.C., USA, October. ACM Press
-
S. Delaune and F. Jacquemard. A decision procedure for the verification of security protocols with explicit destructors. In Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS'04), pages 278-287, Washington, D.C., USA, October 2004. ACM Press.
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS'04)
, pp. 278-287
-
-
Delaune, S.1
Jacquemard, F.2
-
15
-
-
0003250993
-
New results on local inference relations
-
R. Givan and D. A. McAllester. New results on local inference relations. In KR, pages 403-412, 1992.
-
(1992)
KR
, pp. 403-412
-
-
Givan, R.1
McAllester, D.A.2
-
16
-
-
85034749972
-
On word problems in equational theories
-
ICALP, Springer
-
J. Hsiang and M. Rusinowitch. On word problems in equational theories. In ICALP, volume 267 of LNCS, pages 54-71. Springer, 1987.
-
(1987)
LNCS
, vol.267
, pp. 54-71
-
-
Hsiang, J.1
Rusinowitch, M.2
-
17
-
-
51149098006
-
An e-unification algorithm for analyzing protocols that use modular exponentiation
-
Robert Nieuwenhuis, editor, RTA. Springer
-
D. Kapur, P. Narendran, and L. Wang. An e-unification algorithm for analyzing protocols that use modular exponentiation. In Robert Nieuwenhuis, editor, RTA, volume 2706 of Lecture Notes in Computer Science, pages 165-179. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2706
, pp. 165-179
-
-
Kapur, D.1
Narendran, P.2
Wang, L.3
-
18
-
-
24944560619
-
Intruder deduction for ac-like equational theories with homomorphisms
-
Lecture Notes in Computer Science, Nara, Japan, April. Springer. To appear
-
P. Lafourcade, D. Lugiez, and R. Treinen. Intruder deduction for ac-like equational theories with homomorphisms. In Proceedings of the 16th International Conference on Rewriting Techniques and Applications (RTA '05), Lecture Notes in Computer Science, Nara, Japan, April 2005. Springer. To appear.
-
(2005)
Proceedings of the 16th International Conference on Rewriting Techniques and Applications (RTA '05)
-
-
Lafourcade, P.1
Lugiez, D.2
Treinen, R.3
-
19
-
-
0027578148
-
Automatic recognition of tractability in inference relations
-
David A. McAllester. Automatic recognition of tractability in inference relations. J. ACM, 40(2):284-303, 1993.
-
(1993)
J. ACM
, vol.40
, Issue.2
, pp. 284-303
-
-
McAllester, D.A.1
-
20
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
C. Meadows. The NRL protocol analyzer: an overview. Journal of Logic Programming, 26(2):113-131, 1996.
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
21
-
-
18544366384
-
A unification algorithm for the group Diffie-Hellman protocol
-
C. Meadows and P. Narendran. A unification algorithm for the group Diffie-Hellman protocol. In Workshop on Issues in the Theory of Security (in conjunction with POPL'02), Portland, Oregon, USA, January 14-15, 2002.
-
(2002)
Workshop on Issues in the Theory of Security (In Conjunction with POPL'02), Portland, Oregon, USA, January 14-15
-
-
Meadows, C.1
Narendran, P.2
-
23
-
-
24144477933
-
Symbolic protocol analysis with an abelian group operator or Diffie-Hellman exponentiation
-
J. Millen and V. Shmatikov. Symbolic protocol analysis with an abelian group operator or Diffie-Hellman exponentiation. Journal of Computer Security, 2005.
-
(2005)
Journal of Computer Security
-
-
Millen, J.1
Shmatikov, V.2
-
25
-
-
35048827395
-
Decidable analysis of cryptographic protocols with products and modular exponentiation. in Proceedings of ESOP'04
-
Springer-Verlag
-
V. Shmatikov. Decidable analysis of cryptographic protocols with products and modular exponentiation. In Proceedings of ESOP'04, volume 2986 of Lecture Notes in Computer Science, pages 355-369. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2986
, pp. 355-369
-
-
Shmatikov, V.1
-
26
-
-
0009582826
-
The srp authentication and key exchange system
-
IETF - Network Working Group, September
-
T. Wu. The srp authentication and key exchange system. Technical Report RFC 2945, IETF - Network Working Group, September 2000. available at http://www.ietf.org/rfc/rfc2945.txt.
-
(2000)
Technical Report
, vol.RFC 2945
-
-
Wu, T.1
|